Software Developers

Updating SwiftUI Views From Objective-C Using MVVM Updating SwiftUI Views From Objective-C Using MVVM

On the internet, in the Apple documentation, and on Medium, there is a ton of information about..
Getting Started With Web Components Using Stencil Getting Started With Web Components Using Stencil

Web components (or Custom Elements) are a set of standardized APIs that allow you to create..
Building Multiple Barcode, QR Code and Datamatrix Scanner With Flutter for Inventory Management Building Multiple Barcode, QR Code and Datamatrix Scanner With Flutter for Inventory Management

Barcode scanning is an essential tool for modern inventory management. It improves accuracy,..
What “The Rings of Power” Taught Me About a Career in Tech (Part 4) What “The Rings of Power” Taught Me About a Career in Tech (Part 4)

At last comes their answer through cold and through frost, That not all who wonder or wander are..
Deploying Prometheus and Grafana as Applications using ArgoCD — Including Dashboards Deploying Prometheus and Grafana as Applications using ArgoCD — Including Dashboards

If you're tired of managing your infrastructure manually, ArgoCD is the perfect tool to streamline..
Unlocking the Potential of IoT Applications With Real-Time Alerting Using Apache Kafka Data Streams .. Unlocking the Potential of IoT Applications With Real-Time Alerting Using Apache Kafka Data Streams ..

IoT devices have revolutionized the way businesses collect and utilize data. IoT devices generate..
Node.js vs Python: Which Suits Your Application? Node.js vs Python: Which Suits Your Application?

Would you like to know the best technology for your web application? Have a glance at Node.js and..
Secure APIs: Best Practices and Measures Secure APIs: Best Practices and Measures

An API (Application Programming Interface) acts as an intermediary between two distinct software..
The Top 10 Blog Posts of 2023 The Top 10 Blog Posts of 2023

Every January on the SEI Blog, we present the 10 most-visited posts of the previous year. This..
Socket Programming in Python: Client, Server, and Peer-to-Peer Libraries Socket Programming in Python: Client, Server, and Peer-to-Peer Libraries

In this tutorial, you'll learn how to exchange data between a client and a server using Python..
The SEI SBOM Framework: Informing Third-Party Software Management in Your Supply Chain The SEI SBOM Framework: Informing Third-Party Software Management in Your Supply Chain

This post presents a framework to promote the use of SBOMs and establish practices and processes..
Generative AI Q&A: Applications in Software Engineering Generative AI Q&A: Applications in Software Engineering

This post explores the transformative impacts of generative AI on software engineering as well as..
Explainability in Cybersecurity Data Science Explainability in Cybersecurity Data Science

This post provides an overview of explainability in machine learning and includes illustrations of..
Secure by Design at CERT Secure by Design at CERT

The national cybersecurity strategy calls on tech providers to ensure that all their products are..
Assuring Cyber-Physical Systems in an Age of Rising Autonomy Assuring Cyber-Physical Systems in an Age of Rising Autonomy

This post discusses research by the SEI and Georgia Tech to address a number of challenges related..
How to Monitor Apache Flink With OpenTelemetry How to Monitor Apache Flink With OpenTelemetry

Apache Flink monitoring support is now available in the open-source OpenTelemetry collector. You..
Configure Kubernetes Health Checks Configure Kubernetes Health Checks

Kubernetes is an open-source container orchestration platform that helps manage and deploy..
The Need for Quantum Software Architecture The Need for Quantum Software Architecture

This post explores concerns software architects are likely to have when integrating quantum..
How to Tackle Mobile CI/CD: A Hands-on Guide for Mobile App Developers How to Tackle Mobile CI/CD: A Hands-on Guide for Mobile App Developers

React Native is a popular framework for developing cross-platform mobile apps using JavaScript and..
A Repository of Common Penetration-Testing Weaknesses A Repository of Common Penetration-Testing Weaknesses

Penetration testing is an important step in identifying weaknesses in an organizations IT..
Places Of Interest In Houston Texas Places Of Interest In Houston Texas

Places of Interest In Houston Photo Courtesy of: Alfonso Perez Discovery Green Address: 1500..
How to Quickly Build an Audio Editor With UI How to Quickly Build an Audio Editor With UI

Audio is the soul of media, and for mobile apps in particular, it engages with users more, adds..
An Introduction to Data Mesh An Introduction to Data Mesh

As more and more teams have started to look for solutions that can help them unlock the full..
Security Analytics: Using SiLK and Mothra to Identify Data Exfiltration via the Domain Name Service Security Analytics: Using SiLK and Mothra to Identify Data Exfiltration via the Domain Name Service

This post explores how the DNS protocol can be abused to exfiltrate data by adding bytes of data..
RabbitMQ vs. Memphis.dev RabbitMQ vs. Memphis.dev

What Is RabbitMQ?RabbitMQ is a lightweight and easy-to-deploy messaging queue for on-premises and..
Designing Great Challenges for Cybersecurity Competitions Designing Great Challenges for Cybersecurity Competitions

This blog post highlights the SEIs experience developing cybersecurity challenges for the..
Dialogflow CX CLI: The Missing CLI To Interact With Your Agents Dialogflow CX CLI: The Missing CLI To Interact With Your Agents

Previous RequisitesHere are the technologies used in this projectGoogle Cloud AccountDialogflow API ..
How to Start a Party Rental Business How to Start a Party Rental Business

If you want to know how to start a party rental business, the experts at Event Rental Systems can..
Play it Again Sam! or How I Learned to Love Large Language Models Play it Again Sam! or How I Learned to Love Large Language Models

This post explores what new advancements in AI and large language models mean for software..
The Latest Work from the SEI: Zero Trust, DevSecOps, and Software Resilience The Latest Work from the SEI: Zero Trust, DevSecOps, and Software Resilience

This blog highlights recent SEI publications in the areas of zero trust, DevSecOps, and software..
Hackerman [Comic] Hackerman [Comic]

In this latest Daniel Stori comic, discover the latest new character in the programming world:..
Tackling Collaboration Challenges in the Development of ML-Enabled Systems Tackling Collaboration Challenges in the Development of ML-Enabled Systems

This SEI blog post highlights research examining the collaboration challenges inherent in the..
What is a Workforce Education? » CCsmart What is a Workforce Education? » CCsmart

A workforce education means programs that train, develop, and sustain essential career skills...
ChatGPT Prompts for Agile Practitioners ChatGPT Prompts for Agile Practitioners

TL; DR: ChatGPT Prompts for Scrum PractitionersLast week, I ran an “interview” with ChatGPT as an..
Essential Mobile App Security Tips for Coders in 2023: Make Your App Unhackable Essential Mobile App Security Tips for Coders in 2023: Make Your App Unhackable

Applications have proliferated over the years, from the industrial revolution to the smartphone..
Why Many Developers Don’t Write or Give Talks and How To Overcome Challenges Why Many Developers Don’t Write or Give Talks and How To Overcome Challenges

I asked on Twitter and LinkedIn why many developers don’t write or give talks, and I was amused by..
5 Tips for Optimizing Your React App’s Performance 5 Tips for Optimizing Your React App’s Performance

One of the most frustrating things as a React developer is investing time and effort into building..
Writing Ansible Roles with Confidence Writing Ansible Roles with Confidence

How do you write Ansible roles in a way where you can be confident your role works as intended?..
Upgrading a 20 year old University Project to .NET 6 with dotnet-upgrade-assistant Upgrading a 20 year old University Project to .NET 6 with dotnet-upgrade-assistant

I wrote a Tiny Virtual Operating System for a 300-level OS class in C# for college back in 2001 (?) ..
Using Home Assistant to integrate a Unifi Protect G4 Doorbell and Amazon Alexa to announce visitors Using Home Assistant to integrate a Unifi Protect G4 Doorbell and Amazon Alexa to announce visitors

I am not a Home Assistant expert, but it's clearly a massive and powerful ecosystem. I've..